Jetico Central Manager. Administrator Guide

Size: px
Start display at page:

Download "Jetico Central Manager. Administrator Guide"

Transcription

1 Jetico Central Manager Administrator Guide

2 Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number of workstations involved. Jetico Central Manager included as a feature in Enterprise Editions of Jetico software is used to remotely deploy the software across all workstations, automatically update the software, monitor usage of encrypted containers and disk volumes, distribute security policies and centrally manage recovery information necessary to access encrypted data in case of emergency. Jetico client software provides a wide range of data protection solutions on remote workstations store selected files and folders in encrypted containers, encrypt whole disk partitions and dynamic disk volumes, wipe selected files and folders manually or automatically. Proper use of any security software requires maintaining a specified common policy for an entire company. An IT Admin is able to use Jetico Central Manager to create special security tasks in a central database and automatically distribute them to remote computers. To further ensure safe usage of the client software, Jetico Central Manager gathers rescue information from remote computers. An Administrator could then use the rescue information in case of emergency, such as when users forget their passwords. Beyond simply distributing tasks to remote computers and gathering information, Jetico Central Manager also allows an IT Admin to monitor user activity when they are running the client software. Log messages sent to the Jetico Central Manager Database report configuration changes as well as other security related events. The Administrator can also create reports in HTML format about the current state of the software on client computers. Jetico Central Manager is a flexible and convenient tool for controlling client software on remote computers. Centrally managing a network of workstations immediately results in greater reliability and security far superior to allowing a large organization of computers to independently run data protection software on their own. 2

3 Main Functions Jetico Central Manager provides an IT Admin with a wide range of functions to control client software on remote computers. Such functions include deploying and updating client software, remotely distributing security configuration data and gathering rescue and log information from client computers. Jetico Central Manager can manage the following software on client computers: BCWipe: permanently delete selected data files on active workstations, including wipe free space BestCrypt Container Encryption: store selected files or folders in encrypted containers with access to data through virtual drives BestCrypt Volume Encryption: encrypt all data stored on whole Windows partitions or volumes Jetico Central Manager allows an administrator to do the following: Deploy Jetico software remotely from Jetico Central Manager Console Update Jetico software automatically Distribute security policies that includes: Configure BCWipe on client computers to run wiping tasks according to a set schedule Initiate encryption of client computers from Central Manager Console. Gather information about encrypted containers created on remote computers; Administrator can use the information for recovering data inside the containers in case of emergency Store rescue information about encrypted partitions/volumes from client computers; Administrator can use the information for recovery decryption of partitions on client computers Jetico Central Manager provides administrator with the means to monitor the correct use of Jetico software on client computers: All client software can send log information to a central database about events on client computers, such as when BCWipe successfully receives updated configuration from the server Administrator can monitor the status of client software, such as which disk partitions are encrypted and which are not Administrator can create reports in HTML format with information about current security status of client computers Jetico Central Manager enables an administrator to automate his/her own work: Administrator can set a schedule for automatic update of client software; Administrator can set a schedule for automatic backups of the Jetico Central Manager Database Jetico Central Manager handles security issues when sensitive information from client computers is gathered in a central database: All network traffic between client computers and a server is encrypted with a unique session key and public/private key technology Sensitive information in the Jetico Central Manager Database is encrypted Jetico Central Manager implements two-level database administration: Supervisor can run all control functions and can delegate rights to Administrator; Supervisor can change Administrator credentials or remove Administrator account at any time Jetico Central Manager provides Administrator (or Supervisor) with a unified interface to run all control functions. The user interface is designed to be intuitively clear to make all administrative work as effective as possible. See also: Deployment of Client Software Remotely 3

4 Jetico Central Manager Prerequisites Jetico Central Manager requires the following minimum computer configuration: Operating system: Windows Windows Windows Windows Windows Windows 10; 8/8.1 (32-bit and 64-bit versions); 7 (32-bit and 64-bit versions); Vista (32-bit and 64-bit versions); XP (32-bit and 64-bit versions); 2000; Windows Server 2012; Windows Server 2008 (32-bit and 64-bit versions); Windows Server 2003 (32-bit and 64-bit versions); 20 MB disk space for installation process 4

5 New features in Jetico Central Manager v.2 1. Version 2 of Jetico Central Manager can control BestCrypt Container Encryption, BCWipe and BestCrypt Volume Encryption software on client computers. Jetico Central Manager software architecture is designed so that support of other utilities can easily be added in future. 2. Jetico Central Manager v.1 (initially known as BestCrypt Corporate Edition) requred installation in Windows network with Domain Controller. The new version 2 of Jetico Central Manager also uses all the advantages provided by Domain Controller network, but now it is not an absolute requirement. The new version can work in a network without Domain Controller. Furthermore, the Administrator of Jetico Central Manager can manage a mixed network environment, including all workstations in Windows Domain as well as guest computers not permanently included in the Domain. 3. Jetico Central Manager uses a platform-independent encrypted TCP/IP protocol for client/server communication. Together with independence of Windows Domain Controller protocols, this allows the software to manage Jetico client software running on computers with non-windows operating systems. The upcoming releases of BestCrypt for Linux and MacOS will include client modules similar to the ones developed for Windows versions of the software and can be managed by Jetico Central Manager software. 4. Jetico Central Manager v. 2 allows an Administrator to use Push and Manual deployment methods. Administrator can also use a third-party program (e.g., Microsoft SCCM, LANDesk) to deploy Jetico client software on remote computers (so called Outside method). 5. Jetico Central Manager provides detailed logging of events happening on remote computers as well as logging of all actions run by an Administrator in the Jetico Central Manager Console. The user can configure the log output. 6. Administrator of Jetico Central Manager can create reports in HTML format about the current state of Jetico software on client computers. 7. Administrator can group Computers in Jetico Central Manager Database and then control a group of computers as if they were a single computer. For example, an Administrator can set a common BCWipe wiping task for such a group; then if the Administrator changes the task, it would automatically be changed for all computers in that group. 8. Jetico Central Manager implements two-level database administration: by Supervisor and by Administrator. Supervisor can run all control functions and can delegate rights to Administrator; Supervisor can change Administrator credentials or remove Administrator account at any time. See also: Deployment Client Software Remotely Push deployment method Outside/Manual deployment methods Jetico Central Manager reports Computers in Jetico Central Manager Database Supervisor and Administrator of Jetico Central Manager Database 5

6 Jetico Central Manager Installation Jetico Central Manager Installation Microsoft Remote System Administration Tools (RSAT) installation 6

7 Jetico Central Manager Installation Jetico Central Manager software consists of two main modules: Jetico Central Manager Console - program with graphic user interface enabling an Administrator to control all the software functionality Jetico Central Manager Database - service supporting the database and responding to requests received from client computers Jetico Central Manager Console and Jetico Central Manager Database can be installed on different computers with Windows operating system or on the same computer. The computer for installing Jetico Central Manager Console is typically the administration console computer where an administrator runs programs to control the enterprise network and client computers. The computer for Jetico Central Manager Database should be a server computer that is always available in the enterprise network because client computers may send requests to the Database at any time. The installation program installs Jetico Central Manager Console. Run the installation program on a computer that is suitable for running the Jetico Central Manager Console program. The Jetico Central Manager Setup program uses the standard Windows method for installing software and provides all necessary explanations of the installation details. The only default information the user may want to change during installation is the Program Folder name for the Jetico Central Manager software and the Destination Directory name where to place program files. All dialog windows of the Setup program have the following buttons: [Cancel] - click this button to abort installation [Next] - click this button to proceed with the installation [Back] - click this button to return to the previous step NOTE: The Jetico Central Manager Setup program also writes data to the Windows Registry database, places dynamic load libraries in the system WINDOWS\SYSTEM directory, and prepares a file for the uninstall procedure. Please do not perform any manual manipulations to install or uninstall the Jetico Central Manager software in order to prevent the appearance of unused garbage software in the system directory or unused strings in the Registry database. When you run Jetico Central Manager Console for the first time, the Jetico Central Manager Wizard will guide you through the installation process for the Jetico Central Manager Database module. See also: Jetico Central Manager Wizard 7

8 Microsoft Remote System Administration Tools (RSAT) installation When Jetico Central Manager (JCM) runs in Windows Domain network, the software can utilize Microsoft Active Domain functionality available in the Domain like listing Domain computers or running automated deployment of client software on the Domain computers. To be able to do that JCM needs to have Microsoft Remote System Administration Tools (RSAT) package installed on the computer where JCM Console runs. General information about Microsoft RSAT is available on: Remote Server Administration Tools (RSAT) for Windows Client and Windows Server Informal example of installation of RSAT in Windows 7: Install Group Policy and AD Tools on Windows 7 Download link for RSAT for Windows 8: Remote Server Administration Tools for Windows 8.1 Remote Server Administration Tools for Windows 8 Download link for RSAT for Windows 7: Remote Server Administration Tools for Windows 7 with Service Pack 1 (SP1) Description and download link for RSAT for Windows Vista: Description of Windows Server 2008 Remote Server Administration Tools for Windows Vista Service Pack 1 Download the Microsoft Remote Server Administration Tools for Windows Vista Service Pack 1 32-bit Edition Download the Microsoft Remote Server Administration Tools for Windows Vista Service Pack 1 64-bit Edition NOTE: Jetico Central Manager (JCM) detects Windows Domain network and if Microsoft RSAT is not installed on the computer, JCM Console program dispays notification message suggesting JCM Administrator should install RSAT package. 8

9 Jetico Central Manager Wizard Jetico Central Manager Wizard provides an easy way to perform initial configuration of Jetico Central Manager Database. The Wizard explains every step of the configuration in a separate dialog window. There are five steps to configure the software: 1. Select folder on local or remote computer for installation of Jetico Central Manager Database. Please keep in mind the following considerations when you select folder for the Database installation: a. Jetico Central Manager Database is supported by special service. So the program will install the service on the computer where the Database is located. Confirm that installation of the service is allowed on the computer. b. Computer with the Database should be powered on while remote client workstations may need to contact it. 2. Enter credentials of administrator account valid on the computer where the Jetico Central Manager Database is going to be installed. If you have Windows network with Domain Controller, enter credentials of domain administrator. Otherwise enter username and password of administrator of the computer where Jetico Central Manager Database is going to be installed. 3. Enter TCP/IP port number for network communication between clients and Jetico Central Manager server computers. Please be sure that TCP/IP port number you enter is not blocked by firewall software installed on computers in the enterprise network. 4. Initialize password of Supervisor of Jetico Central Manager Database. Note that there are two kinds of persons in Jetico Central Manager who can control the software: Supervisor and Administrator. Supervisor has all rights to administrate the Database and can delegate the rights to another person - Administrator. Administrator also has full rights to manage the Database, but Supervisor can change or remove the Administrator Account at any time. 5. Select and download Jetico client software (i.e., BCWipe, BestCrypt Container Encryption, BestCrypt Volume Encryption). Jetico Central Manager can support any combination of the client software. For example, some organizations may decide only use BCWipe, while others might use BestCrypt Container Encryption with BestCrypt Volume Encryption or perhaps BestCrypt Volume Encryption and BCWipe. It is also possible to initially start using Jetico Central Manager with just one client software (such as BCWipe) and then extend licensing to include BestCrypt Container Encryption. Choosing the set of client software supported by Jetico Central Manager is done in the configuration Wizard. Yet it is also possible to do the same at any later time by running a List of Supported Client Software command from Software menu in Jetico Central Manager Console. NOTE: Before installation of the Jetico Central Manager Database please check the network settings as written in the Pre-deployment Steps article. The instructions are suitable for Database installation as well as for Jetico client software deployment. See also: Deployment of Client Software Remotely Supervisor and Administrator of Jetico Central Manager Database Pre-Deployment Steps Deployment Error Codes 9

10 Using Jetico Central Manager Using Jetico Central Manager Deployment of Client Software Central Management of Client Software Jetico Central Manager Database 10

11 Using Jetico Central Manager This section describes the main steps for using Jetico Central Manager software and provides references to corresponding articles explaining them in greater detail. The primary purpose of Jetico Central Manager is to provide an administrator of an enterprise network with means to install Jetico client software on remote computers automatically and then control the software from a central management console application (Jetico Central Manager Console). Articles in section Deployment Client Software Remotely explain how the administrator can deploy Jetico client software on remote computers, which methods of deployment are preferred in a network with Domain Controller, how client computers have to be pre-configured and other issues related to the deployment process. Articles in section Central Management of Client Software explain how the administrator can manage BCWipe, BestCrypt Container Encryption and BestCrypt Volume Encryption software deployed on remote computers and what information the administrator receives from the computers. Articles in section Jetico Central Manager Database explain how the administrator can backup and restore the Database, automate updating client and server software, what is meant by Administrator and Supervisor accounts and other management procedures. See also: Deployment of Client Software Remotely Central Management of Client Software Jetico Central Manager Database 11

12 Deployment of Client Software Deployment of Client Software Remotely Deployment Steps and States Pre-Deployment Steps Push deployment method Outside/Manual deployment methods Deployment Error Codes 12

13 Deployment of Client Software Remotely Jetico Central Manager software allows Administrator of an enterprise network to deploy client software on remote computers without visiting every computer and running setup program on the computer. The Administrator runs the deployment of the client software from the Jetico Central Manager (JCM) Console. All the settings and procedures necessary to run the deployment are available in Deployment tab in the right pane of the program. JCM supports several software packages on client computers: BCWipe, BestCrypt Container Encryption and BestCrypt Volume Encryption. The Administrator may wish to install only one of these packages, then decide to install another one. It is also possible that number of software supported by JCM will increase. To make the process of adding or removing client software easier, JCM has a single deployment Agent distributed to client computers. Once the Agent is installed on the client computer, it monitors settings the Administrator makes for client software installation. Depending on the JCM settings the client deploys or removes software on the client computer automatically. To make all the processes of deployment client software and then to get them updated automatically, the Administrator should only distribute/install JCM Agent to all the client computers. There are three ways to do that: Manual deployment. The Administrator runs JCM Agent installation program on the client computer manually. Outside deployment. The Administrator uses third-party deployment mechanisms to distribute and run JCM Agent installation program on the client computers. For example, System Center Configuration Manager - SCCM. Push deployment. The deployment method is avalable for computers that are members of Windows Domain. With this method Administrator marks computers where the Agent should be installed in JCM Console Deployment tab and JCM sends necessary instructions to Windows Domain Controller Server to complete the task. See also: Pre-Deployment Steps Deployment Steps and States Push deployment method Outside/Manual deployment methods Deployment Error Codes 13

14 Pre-Deployment Steps If computer where Jetico Central Manager Database is installed has Windows Firewall active, configure the Firewall to allow TCP/IP port used by Jetico Central Manager (JCM) for client/server communication. (Default port number is Administrator sets the port when runs Jetico Central Manager Wizard to initialize Jetico Central Manager Database. You may also get information about the port number by running command Select Server Computer from Database menu.) Configuration settings for Push deployment method Push deployment method is available in JCM for computers that are members of Windows Domain network. With this method the JCM Console Administrator marks client computers that should get Jetico client software installed in JCM Console Deployment tab. Then JCM sends all necessary instructions to Domain Controller to install Jetico software on remote client computers. To utilize the Push deployment method computer where JCM Console runs must have Microsoft Remote System Administration Tools (RSAT) package installed. Read more about RSAT in Microsoft Remote System Administration Tools (RSAT) installation article. See also: Jetico Central Manager Wizard Microsoft Remote System Administration Tools (RSAT) installation 14

15 Deployment Steps and States This article explains steps of deployment and uninstallation of Jetico client software on remote computers and how an administrator controls the processes with Jetico Central Manager Console. The following picture illustrates states of the deployment and uninstallation processes. Deployment process starts from State 1: Software is not deployed. To run the deployment process Administrator should do the following: 1. Select a computer in the left pane of the Jetico Central Manager Console. 2. Select Deployment tab in the right pane of Jetico Central Manager Console. 3. For a certain computer, decide what client software should be deployed (for example, BCWipe only, or all available client software). 4. Click corresponding check boxes in the table in the Deployment tab that lists computers and software that should be deployed. 5. Choose a deployment method in Deployment method column. 6. Click [Apply]. Check boxes for software that has to be deployed appear in a checked state with a red colored plus mark. The red mark means that Administrator has assigned the software for deployment but has not yet applied the settings. Jetico Central Manager has not saved the settings to database yet, so if Administrator quits the program or clicks [Cancel], Jetico Central Manager will forget the settings. Such a state of deployment process is State 2: Software is assigned for deployment. If Administrator clicks [Apply] in the Deployment tab, Jetico Central Manager saves all the settings made on Step 2 to database. If Push deployment method is assigned, the deployment proceeds in the following way: JCM sends the request to Domain Controller to configure Group Policy settings for the client computer to start the software installation after reboot. When client machine is turned on or rebooted, and if the Group Policy is successfully updated, the Installation Agent and the client software will be installed at the next reboot. If Outside/Manual deployment method is assigned, the deployment will be started after running the jci@xxx.exe program on the client machine. Until then, the deployment process will remain in State 3: Software is queued for deployment. As soon as Jetico Central Manager deploys client software on remote computer, the database sets State 4: Software is deployed for the computer. The following picture illustrates Deployment tab in Jetico Central Manager Console where different computers are in different states of the deployment process. 15

16 To uninstall the client software Administrator should do the following: 1. Click checkbox for corresponding software and computer in the Deployment tab. 2. If the software is in State 4 (software is deployed) or State 3 (software is queued for deployment), Jetico Central Manager will set State 5: Software is assigned for uninstallation for the computer. Red colored minus mark corresponds to the state, because administrator has just clicked the checkbox, but not applied the new setting yet. If Administrator quits the program or clicks [Cancel], the state will return back to a previous state of the software. 3. If Administrator clicks [Apply] in the Deployment tab, Jetico Central Manager saves all the settings made on Step 5 to database. Since that moment state of the uninstallation process becomes State 6: Software is queued for uninstallation. At State 6, Jetico Central Manager will run process of unistallation of the software from remote computer when it will be possible. Uninstallation process can be run when the user logs on to remote computer. When the client software gets uninstalled from the remote computer, Jetico Central Manager sets initial State 1: Software is not deployed for the computer. NOTE: There is another way to uninstall the client software: delete the computer from JCM database. In that case, if the deleted client computer is turned on or rebooted, the client software will be uninstalled and also Installation Agent will be removed. Note that on every step of deployment or uninstallation software from remote computers some problem may arise. The table with list of computers in the Deployment tab has the Error code column with number of error occurred (or with No error status if everything is going on correctly). Read article Deployment Error Codes to get detailed explanations and possible solution for the problem. Administrator can configure a whole group of computers for deployment of the client software. In this case Administrator should just click checkbox with name of the group. Since 16

17 that time the state Administrator sets for the group will be automatically applied for all the computers from the group. See also: Pre-Deployment Steps Push deployment method Outside/Manual deployment methods Deployment Error Codes 17

18 Push Deployment Method Push deployment method is available in JCM for computers that are members of Windows Domain network. To utilize the Push deployment method computer where JCM Console runs must have Microsoft Remote System Administration Tools (RSAT) package installed. Read more about RSAT in Microsoft Remote System Administration Tools (RSAT) installation article. NOTE: only Domain Administrators are allowed to run the Push deployment on remote computers. So when you run JCM Console, you should be logged on as a user from Domain Administrators Group. Besides, computer where JCM Console runs should belong to the Domain. To run Push deployment Administrator should do the following: 1. Select Deployment tab in the right pane of Jetico Central Manager Console. 2. Select a group or computer in the list and set checkbox for the group or computer in the Group or Computer column. 3. Set checkboxes in columns that correspond to the client software you want to get deployed on the computer (for example, set checkbox in the BCWipe or BestCrypt Container Encryption column). 4. Double-click combo-box from Deploy method column for the computer and select Push string from the combo-box. 5. Click [Apply] to start the deployment process or click [Cancel] to restore previous deployment settings for the computer. The deployment proceeds in the following way: JCM sends the request to Domain Controller to configure Group Policy settings for the client computer to start the software installation after reboot. When client machine is turned on or rebooted, wait until the Group Policy is successfully updated on the client. The Installation Agent and the client software will be installed after next reboot of the client, because the installation command is included in Windows Startup script. JCM Console updates the deployment status to Deployed and corresponding message appears in the log file in the bottom part of Deployment tab. See also: Pre-Deployment Steps Deployment Steps and States Deployment Error Codes 18

19 Outside/Manual Deployment Methods Jetico Central Manager (JCM) simplifies the process of deployment of the client software on remote computers in the following way. There is a number of Jetico software that can be installed on client computers (BestCrypt Container Encryption, BCWipe, BestCrypt Volume Encryption). The JCM Administrator may wish to install or uninstall, or update any of them. To be able to do that from JCM Console program without visiting the computers, the Administrator should install so called JCM Deployment Agent on every client computer. To install JCM Deployment Agent the Administrator should run its installation program (JCIxxx.EXE) on client computers. Article Push deployment method describes how it can be done if the client computers belongs to Windows Domain Network. This article describes alternative methods to install the JCM Agent. Manual deployment method The JCM Administrator can install JCM Deployment Agent on client computer manually. It can be done in the following way: 1. Click [Client software] in the Deployment tab. The following dialog window will appear: 2. Choose Manual deployment method and mark checkboxes corresponding to the software you plan to deploy on client computers (BCWipe and/or BestCrypt Container Encryption and/or BestCrypt Volume Encryption). 3. Click [Make Copy] to copy the JCIxxx.EXE Agent installation program to the folder where from you are going to run the program. 4. Click [Exit] to close the dialog window. 5. On every client computer, run the JCIxxx.EXE program. 19

20 When you run the Agent installation program, you will get message boxes on the client computer informing you about results of deployment client software on the computer. Besides, you will get the same information in the Log window in the Deployment tab in the JCM Console. Outside deployment method The JCM Administrator can use a third-party deployment software to automate installation of JCM Deployment Agent on client computers. For such a software you should prepare JCIxxx.EXE JCM Agent installation program almost in the same way as you prepare it for Manual installation method described above. The only difference is in choosing Outside method on step 2 of creating the JCIxxx.EXE file. JCIxxx.EXE program created with Outside option will behave slightly differently on the client computer: the program will not display any messages on the client computer that would inform about any progress in running the program. Instead, all the messages will be sent to JCM Database and displayed in the Deployment tab in the JCM Console. NOTE: The JCM Administrator may add computers to JCM Database prior to running JCIxxx.EXE program on client computers. Then the Administrator should choose Outside/ Manual deployment method for the computers. It is a recommended way to organize the deployment, because in this case the Administrator can easily monitor status of the installed software on the remote computers. NOTE: It is also possible to run JCI.EXE program from \\JCM_SERVER_NAME\BCInstal shared folder with command-line parameters: -R[server_name], -P[port_number] and S[name of the client software that should be installed]. JCM_SERVER_NAME - name of the computer where JCM Database is installed <W> flag - BCWipe client software <B> flag - BestCrypt Container Encryption client software <V> flag - BestCrypt Volume Encryption client software EXAMPLES: >JCI.EXE -RJCM_SERVER_NAME >JCI.EXE -RJCM_SERVER_NAME >JCI.EXE -RJCM_SERVER_NAME >JCI.EXE -RJCM_SERVER_NAME -P5001 -P5001 -P5001 -P5001 -SW (install BCWipe) -SB (install BestCrypt Container Encryption) -SV (install BestCrypt Volume Encryption) -SWBV (install all software) See also: Pre-Deployment Steps Deployment Steps and States Deployment Error Codes 20

21 Deployment Error Codes When Jetico Central Manager encounters a problem during client software deployment, the error number is reported in Error code column in Deployment tab in Jetico Central Manager (JCM) Console. Column Action describes operation that caused the error and may also contain short description of the problem. There are three groups of errors that may be reported during client software deployment: Errors reported in JCM Console when Administrator chooses Push deployment method for client computers. Errors happened when configuration of Push installation completed successfully in JCM Console, but installation of JCM client software does not start even when the client computer restarts. Errors reported on client computers when Administrator chooses Manual or Outside deployment method and runs installation program on the computers. The following sections describe the errors in more detail. I. Errors reported in JCM Console for Push deployment method Error 1 JCM Console program could not locate Windows Domain Controller computer in a local network. Please check that Domain Contoller computer is running and accessible from the JCM Console computer. Error 2 Computer with JCM Console running appears as not belonging to Windows Domain. Error 3 User logged on the computer is Local User, but should be Domain User. Error 4 User logged on the computer with JCM Console has no rights of Domain Administrator. Error 5 Computer where JCM Console runs must have Remote System Administration Tools (RSAT) package installed. Read more about RSAT in Microsoft Remote System Administration Tools (RSAT) installation article. Error 6 JCM Console could not define Netbios name of Domain Controller computer. Please check that Domain Controller Server can be accessed with its Netbios name from the computer where JCM Console is running. Error 7 Request from JCM Console to create new group of computers called JCM Group [server_name] failed. JCM Console should create the group automatically inside a standard Computers group in Domain. If it does not happen, try to find some entry in Windows Event log that may relate the error. You may also send the text and error codes to Jetico Technical Support (support@jetico.com) for further assistance in solving the problem. Error 8 JCM Console could not define define Fully Qualified Name for the client computer where Push deployment should occur. Error 9 JCM Console could not add the client computer to JCM Group of computers. Please check that the group exists inside a standard Computers group on Domain Controller. Error 10 JCM Console could not create Group Policy Object for JCM Group of computers. NOTE: Windows Event Viewer may report errors related to the JCM Console attempt to create JCM Group of computers or define Fully Qualified Name for the computer. If it does not help, please note that JCM Console log window contains short description of the errors, for example: "Could not define Fully Qualified Name for the computer (error code 7, 200)". You may send the text and error codes to Jetico Technical Support (support@jetico.com) for further assistance in solving the problem. 21

22 II. Configuration of Push installation completed successfully in JCM Console, but installation of JCM client software does not start. 1. If files C:\Windows\jci.log or C:\Windows\smip.log exist, information inside them may help to define source of the problem. 2. Check errors reported in Windows Event Viewer. Pay special attention to Events with GroupPolicy source. For example, error may look like: The processing of Group Policy failed. Windows attempted to read the file \\jetico\sysvol\jetico \Policies\{EA385BE5-1A41-4A DFC37053E2DA}\gpt.ini from a domain controller and was not successful. Group Policy settings may not be applied until this event is resolved. After solving the problem reported in the Event Viewer please restart the client computer and check that JCM client software installation starts. NOTE: After updating Group Policy on the Domain Controller, it is not updated on the client machines at once. By default, the timeout is 90 minutes. For testing purposes, if administrator wants to be sure that it works properly, it is possible to force the Group Policy updating for one particular test client. To do so, run Command Prompt on the client 'as administrator' and run the command gpupdate /force. See Windows Event Viewer. When the Group Policy has been updated, reboot the client and installation should start (even before logon). 3. You may send files C:\Windows\jci.log or C:\Windows\smip.log to Jetico Technical Support (support@jetico.com) for further assistance in solving the problem. III. Errors reported on a client computer when Manual or Outside deployment method runs When Administrator chooses Manual or Outside deployment method, JCM Console creates installation program like jci@serw7@05001@m@swbv.exe. Administrator should run the program on client computers manually or use a third-party utility to distribute and run the program on the computers. The jci@xxx.exe program generates log files C:\Windows\jci.log and C:\Windows\smip.log on the client machine. You may inspect contents of the files, perhaps text description of encountered errors will help to solve the problem. If you are not sure, please send the files to Jetico Technical Support (support@jetico.com) for assistance in solving the problem. NOTE: The same log files are also available from JCM Console. To see the files, Administrator should run Client Log File command from right-click menu of the selected client computer. See also: Microsoft Remote System Administration Tools (RSAT) installation Pre-Deployment Steps Deployment Steps and States Push deployment method Jetico Central Manager Wizard 22

23 Central Management of Client Software Central Management of Client Software Central Management of BCWipe Central Management of BestCrypt Container Encryption Central Management of BestCrypt Volume Encryption 23

24 Central Management of Client Software The primary purpose of Jetico Central Manager is to provide the administrator of an enterprise network with a program to control client software on remote workstations. Jetico Central Manager controls the following client software: BCWipe: permanently delete selected data files on active workstations, including wipe free space. BCWipe can run different kinds of wiping tasks (wipe free space of disk drives, wipe temporary files or remnants of activity of programs like Internet Browsers, etc.). Every BCWipe Task can be run automatically according to schedule. With Jetico Central Manager, an administrator can create a BCWipe Task Set which consists of different types of BCWipe tasks. Then an administrator can configure BCWipe software on remote computers to run wiping tasks according to the Task Set. Administrator can create as many BCWipe Task Sets as needed. Every Task Set can be assigned to different computers or group of computers in the company network. Article Central Management of BCWipe explains how it can be done in detail. BestCrypt Container Encryption: store selected files or folders in encrypted containers with access to data through virtual drives. BestCrypt runs encrypt/decrypt operations transparently for the user as soon as a proper password for the container is entered. Administrator of Jetico Central Manager can configure BestCrypt Container Encryption on client computers to send information about encrypted container files to central database. Communication between client computers and server as well as information inside the database is encrypted. Only Supervisor or Administrator of the Jetico Central Manager Database can use the information about encrypted container in order to access the data inside the container in emergency cases, for example, if the user forgets password for the encrypted container. Read more about remote control of BestCrypt Container Encryption software in the Central Management of BestCrypt Container Encryption article. BestCrypt Volume Encryption: encrypt all data stored on whole Windows partitions or volumes. Jetico Central Manager is used to monitor usage of encrypted disk volumes, distribute encryption policies and centrally manage recovery information necessary to access encrypted data in case of emergency. With Jetico Central Manager, an administrator can initiate encryption/decryption of the client computers remotely from JCM Console. On client side, end-user only needs to enter/set password to initiate encryption as configured by Administrator in JCM. Besides, JCM provides a way to set a protection policy for removable disks. Read article Removable Disks Protection for more information. The Jetico Central Manager Database receives information about encrypted disk volumes from client computers through secure communication channel. The information includes disk volume configuration of the computers and rescue information. Administrator can use the rescue information for recovery purposes, for example, if file system on encrypted disk volume becomes damaged. Read more about remote administrating of the software in Central Management of BestCrypt Volume Encryption article. Jetico Central Manager provides logging of the events happened on remote computers and logging of every action performed by Administrator in the Jetico Central Manager Console. Log information can be viewed at the right pane of the Jetico Central Manager Console at the corresponding client software tab. For example, to monitor BCWipe Log it is necessary to open BCWipe tab. Choose Show for all items option from the combo-box to display the events for all computers. To view the Log for specific computers select the needed computers in the left pane, then choose Show for selected items option from the combo-box at the right side. To hide the Log field press Do not show. It is possible to view the log events starting from the specific date - tick the box Since date and choose the date. The following columns can be displayed in the Log field: Date, Time, Computer, Action and others. To hide/show columns right-click on the column name and mark the desired columns. The maximum size of the Log File can be set in the Reports and Logs menu of Jetico Central Manager Console - Log File Settings command. The picture in the article Central Management of BestCrypt Container Encryption shows how the Log looks like. 24

25 See also: Central Management of BCWipe Central Management of BestCrypt Container Encryption Central Management of BestCrypt Volume Encryption 25

26 Central Management of BCWipe BCWipe on client computers Central Management of BCWipe Creating and editing BCWipe Task Sets Assigning BCWipe Task Sets to client computers 26

27 BCWipe on Client Computers BCWipe software on client computers provides secure deletion of sensitive information on various types of disk volumes (local partitions, dynamic disk volumes, network disks). What does secure deletion really mean? Well, when a user deletes files the operating system does not erase the contents of these files from the disk - only the references to these files are removed from file system tables. Sensitive data that you intended to erase remains intact on your hard drive and could easily be restored with a widely available undelete tool. Wiping is a term used to describe the process of overwriting contents of a file or disk space. When files are properly wiped data is erased beyond recovery. There are several types of information that should be wiped to avoid data leak: Wipe free disk space. When you delete sensitive files using a standard Windows Delete command, the operating system does not shred contents of the documents from hard drive, it just marks disk space earlier occupied by the files as 'free'. Wiping free disk space completely removes all the traces of the earlier deleted files. Delete with wiping. The user can delete and wipe file or folder as well as selected group of files or folders. Wipe Internet History. BCWipe can wipe all the traces of users' activity in the Internet - cache, cookies, browsing history, search history, saved passwords, last active tabs, etc. Besides of Internet Explorer, BCWipe supports Mozilla Firefox, Opera and Google Chrome browsers. Wipe local history (Wipe names of recently used files). BCWipe can wipe names of files opened with Windows components and some popular applications. It can wipe names stored on a subfolder as well as in Windows Registry. Transparent Wiping. When Transparent Wiping is activated on the computer, BCWipe will automatically wipe all contents of any file or folder that is deleted. This task can be active or suspended, but it cannot be scheduled for a predefined time. BCWipe can run wiping tasks for every type of wipe operation. Every wiping task can be run once or configured to run automatically according to some schedule. The picture below illustrates BCWipe Task Manager window with schedule for every wiping task. Jetico Central Manager allows an administrator to manage BCWipe software on client computers from a central management console. The idea of management is in the following. 1. In the Jetico Central Manager Console the administrator creates BCWipe Task Set. 27

28 2. The Task Set includes one or more wiping tasks (The picture above illustrates typical BCWipe Task Set with several wiping tasks: Delete with wiping, Wipe free space and others). 3. The administrator defines schedule for every wiping task in the Task Set. 4. In the Console the administrator assigns configured Task Set on selected computer or group of computers in a company network. If in future the administrator changes the Task Set, the client computer or group of computers will get BCWipe configuration updated. 5. The administrator can create as many Task Sets as needed for the company network. As a result different groups of computers may get different BCWipe Task Sets for their local configurations. 6. The administrator can monitor results of running tasks on client computers using following sources: Log information reported in the BCWipe Log field in BCWipe tab of Jetico Central Manager Console Status and Last error strings reported on the top part of BCWipe tab Detailed Log file generated by BCWipe process - the name and location of the file is specified in the Log File tab of the corresponding wiping task See also: Central Management of BCWipe Creating and editing BCWipe Task Sets Assisgning BCWipe Task Sets to client computers 28

29 Central Management of BCWipe After BCWipe deployment on remote computers the administrator of Jetico Central Manager can do the following to manage BCWipe on the computers: Create BCWipe Task Sets. Every Task Set is a unit of configuration information designed to be sent to remote computer where BCWipe client software is deployed. BCWipe offers the following wiping tasks: Wipe Free Space, Wipe Local History, Wipe Internet History, Delete With Wiping, Transparent Wiping and Swap File Encryption. Read more about wiping tasks in the BCWipe on client computers article. Assign selected BCWipe Task Set to a remote computer or group of computers in a company network to configure BCWipe client software on the computers. Since the administrator can create a number of BCWipe Task Sets, different group of computers can be configured with different Task Sets. Modify existing BCWipe Task Set. View log information concerning central management of BCWipe. It includes information about creating and modifying Task Sets, information from remote computers about changing configuration of BCWipe client software, about problems with BCWipe remote configuration and about results of wiping. Administrator controls BCWipe in an enterprise network with the Jetico Central Manager Console. To start managing BCWipe on remote computers, select computer or computers' group in the left pane of Console and BCWipe tab in the right pane. The following picture illustrates Jetico Central Manager Console when BCWipe tab is selected: There are a number of controls (radio buttons, lists and buttons) in the BCWipe tab. Selected Computer/Group text box shows name of computer or computers' group selected in the left pane of Jetico Central Manager Console. All the changes in BCWipe configuration administrator makes in the right pane will happen for the selected computer or group. Status area - contains deployment status of BCWipe on the selected computer/group, last operation performed on the selected computer and the last error happened on the computer. [Workplace] button to get information about all users who run BCWipe program on the selected computer. 29

30 [Reset error] button - to reset the information reported in the Last error field. Administrator can assign BCWipe Task Set to an individual computer or to group of computers. To assign selected Task Set to group of computers: 1. Select the group of computers in the left pane of Jetico Central Manager Console. 2. Set Inherit Task Set from the computers' Group radio button. 3. Select Task Set you want to use for the group of computers from the list of Task Sets. 4. Click [Assign]. To assign selected Task Set to an individual computer: 5. Select the computer in the left pane of Jetico Central Manager Console. 6. Set Assign individual Task Set to the Computer radio button. 7. Select Task Set you want to use for the computer from the list of Task Sets. 8. Click [Assign]. After assigning or changing Task Set for computer or group, name of the Task Set will appear in the Active Task Set text box. Information about the changes will appear in the BCWipe Log window. Click [Create] to create a new BCWipe Task Set. Article Creating and editing BCWipe Task Sets describes in detail how to create new Task Set. Click [Edit] to change some properties of the selected Task Set. Article Creating and editing BCWipe Task Sets describes in detail how to edit existing Task Set. Set Block BCWipe for local user checkbox to prevent the user on the local computer from running BCWipe commands. Note that you can set the option for individual computer if Assign individual Task Set to the Computer option is set. If the option not set, the computer will inherit setting Block BCWipe for local user from the computer group that is a parent for the computer. BCWipe log area can show information concerning the selected computer only or all computers in database. Each string contains information about date, time, client computer name, user name, action performed, result and error code. Administrator can configure the log window so that it displays only selected columns. See also: Deployment of Client Software Remotely BCWipe on client computers Creating and editing BCWipe Task Sets Assigning BCWipe Task Sets to client computers 30

31 Creating and Editing BCWipe Task Sets To manage BCWipe software on remote computers in a company network administrator of Jetico Central Manager should create one or more BCWipe Task Sets. BCWipe Task Set is a unit of configuration information designed to be sent to remote computer where BCWipe client software is deployed. Creating BCWipe Task Set To create BCWipe Task Set administrator should click following window will appear. [Create] in the BCWipe tab and the Enter Name and Comments for the new Task Set and click [OK] to create wiping tasks for the Task Set. The following window appears: After closing the information message box run command Create New Task from Tasks menu and select type of wiping task you want to add to the Task Set (Wipe Free Space, Wipe Local History, Wipe Internet History, Delete With Wiping or Transparent Wiping). You can add as many wiping tasks to the task set as you want. For every type of wiping task you can set a schedule for running the task regularly on client computer. Besides, every task 31

32 has settings specific for the selected type of wiping task. Please read help documentation of BCWipe software to get a detailed information about all available types of wiping tasks and about their specific settings. After creating wiping tasks BCWipe Task Manager window will show all the tasks: To save all the wiping tasks in a single Task Set file run command Save Task Set from Tasks menu. Then you can exit BCWipe Task Manager by running Exit command and find the Task Set listed in the BCWipe tab in the Jetico Central Manager Console. Administrator can assign BCWipe Task Set to configure BCWipe client software on remote computer as it is described in Central Management of BCWipe article. Editing BCWipe Task Set Administrator of Jetico Central Manager can edit existing BCWipe Task Set. As soon as some Task Set is modified, group of remote computers where BCWipe is configured to use the Task Set receives the modified Task Set. As a result, administrator does not need to modify BCWipe settings on every computer, it is enough to modify a single Task Set used on all the computers. To edit BCWipe Task Set select the Task Set in BCWipe tab of the Jetico Central Manager Console and click [Edit]. The following window will appear. If you want to change name or comments for selected Task Set, edit corresponding strings in the Name or Comments edit boxes. 32

33 If you want to change or inspect wiping tasks in the selected Task Set, select Edit or View wiping tasks in the Task Set checkbox and click [OK]. BCWipe Task Manager window will appear with list of all the wiping tasks of the Task Set. You can select some wiping task and view or change its settings. When you finish editing wiping tasks, run command Save Task File from Tasks menu. Then you can exit BCWipe Task Manager by running Exit command. To completely remove selected Task Set from the Jetico Central Manager Database click [Delete] in the BCWipe tab. NOTE: When you attempt to delete some Task Set, Jetico Central Manager checks is there any computer in a company network that uses the Task Set for configuration, or not. If the Task Set is used for configuration, Jetico Central Manager will send the warning message. If you confirm deleting the Task Set, the computer will stop using the Task Set and BCWipe on the computer will not run wiping tasks from the Task Set anymore. See also: BCWipe on client computers Central Management of BCWipe Assigning BCWipe Task Sets to client computers 33

34 Assigning BCWipe Task Sets to Client Computers Article Creating and editing BCWipe Task Sets describes idea of wiping Task Set as a data sent by Jetico Central Manager to remote computer to configure BCWipe client software running on the computer. Administrator of Jetico Central Manager can change wiping tasks inside BCWipe Task Set. As a result, remote computer that uses the Task Set for BCWipe configuration will use updated set of wiping tasks. Besides, administrator can change Task Set for the computer and it will start using set of wiping tasks from other Task Set. Jetico Central Manager supports computers united to Computer Groups. Administrator can create any number of Computer Groups and include any computer to any Computer Group. When the administrator manages BCWipe on remote computers, he/she can assign BCWipe Task Set to individual computer or to Computer Group. In the latter case all computers from the Group will get the same configuration for BCWipe software running on the computers. If the administrator changes the Task Set used for the Group, the set of wiping tasks running on all the computers from the Group will be updated. Administrator of Jetico Central Manager assigns or changes BCWipe Task Set for computers in the BCWipe tab in Jetico Central Manager Console. To assign selected Task Set to group of computers: 1. Select the group of computers in the left pane of Jetico Central Manager Console. 2. Set Inherit Task Set from the computers' Group radio button. 3. Select Task Set you want to use for the group of computers from the list of Task Sets. 4. Click [Assign]. To assign selected Task Set to an individual computer: 1. Select the computer in the left pane of Jetico Central Manager Console. 2. Set Assign individual Task Set to the Computer radio button. 3. Select Task Set you want to use for the computer from the list of Task Sets. 4. Click [Assign]. The following dialog window appears: Caption of the dialog window shows name of computer or group, Current Task Set text box shows name of Task Set that is currently used on the computer(s). To choose other Task Set for group of computers click Select other Task Set to be run in the group of computers radio button, select new Task Set from the list of available Task Sets and click [OK]. If you decide to configure BCWipe on remote computer(s) so that the software would not run any wiping tasks, click Do not run any Task Sets in the group of computers radio button and click [OK]. 34

35 After assigning or changing Task Set for the computer or group, name of the Task Set will appear in the Active Task Set text box in the BCWipe tab in Jetico Central Manager Console. Information about the change in BCWipe configuration will appear in the BCWipe Log window in the BCWipe tab. Remote computers will get BCWipe configuration updated as soon as they will be turned on and get access to a company network. Or, if the computers are active, after some period of time (up to several minutes) to avoid simultaneous access to the Jetico Central Manager Database and overloading company network or server computer. See also: BCWipe on client computers Central Management of BCWipe Creating and editing BCWipe Task Sets 35

36 Central Management of BestCrypt Container Encryption BestCrypt on client computers Central Management of BestCrypt Container Encryption 36

37 BestCrypt Container Encryption on Client Computers BestCrypt Container Encryption software allows the user to keep any form of data (files, letters, pictures, databases) in encrypted form on the hard disk, networks disks, removable disks, CDs/DVDs and floppies. BestCrypt Container Encryption then lets you access it from any application. BestCrypt Container Encryption allows the user to create a container (for example, 800 Mb container file called Financials.jbc). Then the user can mount this container file as an additional logical drive: it will show up as an additional 800 Mb drive (F:\, for example). When mounted this logical drive looks and operates just like an ordinary disk drive: the user can store personal files on it. All files stored on the drive are automatically encrypted. Every read operation which addresses the drive causes decryption of the data, and every write operation causes encryption of data to be written. Using this system data is always stored in safe encrypted form and appear unencrypted only if the user enters a correct password for the container file and mounts it. The following picture shows the BestCrypt Control Panel, which the user runs to perform all control operations like creating and mounting containers, setting BestCrypt options and so on. BestCrypt Container Encryption supports a number of well-known encryption algorithms (like AES, Twofish, Blowfish, CAST, GOST , IDEA, RC6, Serpent). Since BestCrypt Container Encryption uses strong encryption methods, it is practically impossible to access encrypted data without knowing a proper password or encryption key. Please read BestCrypt Container Encryption Help documentation to get more information about the functions of the software client part. Article Central Management of BestCrypt Container Encryption in this chapter explains in more detail what kind of information Jetico Central Manager receives from BestCrypt programs running on client computers and how administrator can set recovery password for some encrypted container on client computer. See also: Central Management of BestCrypt Container Encryption Central Management of Client Software 37

38 Central Management of BestCrypt Container Encryption Jetico Central Manager gathers information about using BestCrypt Container Encryption software on client computers. Administrator of Jetico Central Manager becomes informed when some problems arise on the computers with the software. Besides, using BestCrypt Container Encryption becomes safer with Jetico Central Manager support because administrator can provide the user with access to the data inside encrypted containers in emergency cases. After deployment of BestCrypt Container Encryption software on client computers the Jetico Central Manager Database receives the following information from the programs running on the remote computers: Information about container files on the computer: full path, description, encryption algorithm, size. Information about the user who mounted the container and date of the latest mount operation. Log information about BestCrypt Container Encryption events (creating and mounting containers, management operations run by administrator). The following picture illustrates the Jetico Central Manager Console when BestCrypt Container Encryption tab is selected: In BestCrypt Container Encryption tab select radio button Show containers of selected computer/group if you want Jetico Central Manager to list only container files created on computer/group selected in the left pane of the program. If you select Show all containers option, Jetico Central Manager will show you a list of all container files registered in the Jetico Central Manager Database. There are also several buttons in the BestCrypt Container Encryption tab: When a user creates or mounts a container, BestCrypt Container Encryption saves encryption key for the container in Jetico Central Manager Database. The database stores the key in encrypted form so that only administrator can manage the key. If the user forgets password for the container file or an urgent need arises to mount the container file administrator can use the encryption key to get the container mounted. It can be done in the following way: 1. Run Jetico Central Manager Console and enter password to get access to encrypted information in the database. 2. Select the computer in the left pane of the program. 3. Select the container in BestCrypt Container Encryption tab in the right pane of the program. 4. Click [Password] and the following window appears: 38

39 The password administrator enters in the dialog window is called Network password, because when later the user (or administrator) enters this password to mount container file on client computer, BestCrypt Container Encryption software on the computer will send request to Jetico Central Manager Database over network. If correct network password is entered, BestCrypt Container Encryption on client computer will be able to decrypt response from Jetico Central Manager Database and use decrypted key to mount the container file. If administrator does not need the Network Password for the container anymore, he/she should select the container in BestCrypt Container Encryption tab and click [Password]. Then in the Network password dialog window he/she should choose Remove Network Password for selected container option and click [OK]. Jetico Central Manager removes information about container file when the user deletes the file from BestCrypt Control Panel on his/her computer. There are also other ways to delete the files without running BestCrypt Container Encryption, for example, by formatting drive with the files. If administrator becomes aware of deleting some container file using not regular way and decides to remove information about the container from database, he/she should select the container in BestCrypt Container Encryption tab of Jetico Central Manager Console and click [Remove]. Program will warn Administrator about removing all information about the container file from the database and if he/she confirms the operation, the information about the container file will be erased from the database. See also: Deployment of Client Software Remotely BestCrypt Container Encryption on client computers 39

40 Central Management of BestCrypt Volume Encryption BestCrypt Volume Encryption on client computers Central Management of BestCrypt Volume Encryption Rescue procedures on client computers Removable Disks Protection 40

41 BestCrypt Volume Encryption on client computers BestCrypt Volume Encryption software (or BCVE) allows the user to encrypt all data on existing disk partitions and disk volumes including basic and dynamic disk volumes as well as boot/system partitions. The following picture shows main window of BCVE program. BCVE supports a number of well-known encryption algorithms (like AES, Twofish, RC6). Encrypted data is protected by password only or by combination of password and hardware token (Aladdin etoken). Since BCVE uses strong encryption methods, it is practically impossible to access encrypted data without knowing a proper password or encryption key. Please read BCVE Help documentation to get more information about the functions of BCVE client part. To reduce risk of loosing encrypted data BCVE always creates and updates rescue files necessary to recover encrypted disk volumes in emergency cases. Besides of creating rescue file BCVE recommends the user to save a copy of the file in a safe place every time the user encrypts or re-encrypts disk volume. Unfortunately if the user ignores the recommendation and then gets default BCVE rescue file inaccessible, it becomes difficult to recover damaged encrypted disk volumes. With Jetico Central Manager (JCM) all the rescue information from client computers becomes saved in a central database in a secure form. As a result, Administrator of JCM can run recovery process on client computer encrypted by BCVE without any special actions from the user of the computer. The JCM Administrator can also enforce client computers to become encrypted or decrypted and such a policy will concern fixed disks on the computers. Regarding removable disks, they have a different way of usage because they may be exchanged between computers. So JCM provides a different way to set a protection policy for removable disks. Read article Removable Disks Protection for more information. The next articles in this chapter explains in more detail what kind of information Administrator of Jetico Central Manager receives from BCVE programs running on client computers (Central Management of BestCrypt Volume Encryption) and how administrator can run recovery decryption process on client computer (Rescue procedures on client computers). See also: Central Management of BestCrypt Volume Encryption Rescue procedures on client computers Removable Disks Protection 41

42 Central Management of BestCrypt Volume Encryption After deployment of BestCrypt Volume Encryption (BCVE) on remote computers administrator can manage BCVE on client computers through BestCrypt Volume Encryption tab of Jetico Central Manager Console: Jetico Central Manager Database receives and displays the following information from BCVE program running on the client computers: 1 - Information about all disk volumes (partitions) on the computer, sizes and labels of the volumes. 2 - Status of every disk volume (encrypted/partially encrypted/not encrypted). 3 - Log information about BCVE events (encrypting/decrypting volumes, installation of new disk volumes, rescue information updating, etc.). Rescue information about all encrypted volumes. Click [Rescue] to prepare rescue file or rescue bootable disk to recover encrypted disk volume on the selected computer. Article Rescue procedures on client computers describes in detail how to recover encrypted disk volumes on client computer. Distributing encryption policies. Administrator of JCM Console can manage encryption policy on client computers using the following settings: Automatic encryption and decryption of client computers. Administrator can set the options Encrypt fixed disks or Decrypt fixed disks to get all the volumes on client computers encrypted or decrypted automatically. Alternatively, administrator can transfer the right to manage a client computer to the local user by setting the option Manage by local user. After Encrypt fixed disks option is set, BCVE on the client computer will ask the user to enter a password to encrypt the volumes. The encryption will start and will be performed in the background. For automatic encryption, BCVE uses AES encryption algorithm and XTS 42

43 encryption mode. The process can be stopped, but it will be automatically resumed after 30 seconds or after reboot. As soon as the process starts, the user will have to enter the password at boot time. NOTE: The automatic encryption may NOT start (or not resume) for the following reasons: 1. The client computer was not rebooted after installation. 2. The client computer is currently using the option Manage by local user. 3. BCVE main window has been opened on the client computer. 3. The client-server connection has been lost. Removable disk policy. JCM administrator can force encryption of removable devices on client computers. The removable devices can be password-protected or JCM-protected inside the local network. See Removable Disks Protection for more details. Click [Recover Removable Disk] to recover encrypted removable disks in case the user has forgotten password or if the disk appeared as damaged. Suspend Protection. Administrator can temporarily suspend client protection, i.e. remove boot-time authentication (note that the volumes are still encrypted). It may be required to allow the computer(s) to automatically restart (Windows Updates, backup purposes, etc.). The feature is necessary to manage servers that are required to function all around the clock. The option is available only for the computers for which Encrypt fixed disks policy is set. As soon as administrator sets this option, JCM Console will report it in the log file: After that, if the client computer is ON, another report in the log file is expected: If the client computer is OFF, it will receive the setting and send this report to the Console when it is turned on. After getting this confirmation from the client, boot-time authentication has been removed. ATTENTION! The option Suspend protection exposes a security risk. For example, someone can turn off the computer, take it out of the company, turn it on again and get access to the data. Remember to turn the option OFF as soon as automatic reboot is not required anymore. To set an encryption policy to a group of computers: 1. Select the group of computers on the left pane of Jetico Central Manager Console. 2. In Inherit Group settings drop-down list select one of the options: Encrypt fixed disks Decrypt fixed disks Manage encryption locally 3. Click Removable Disks Policy hyperlink to set the policy for removable disks. 4. Mark the checkbox Suspend protection if required. To set an individual policy to a computer: 1. Select the computer on the left pane of Jetico Central Manager Console. 2. Set Use individual settings 3. In the drop-down list and select one of the options: Encrypt fixed disks Decrypt fixed didks Manage encryption locally 4. Click Removable Disks Policy hyperlink to set the policy for removable disks. 43

44 5. Mark the checkbox Suspend protection if required. JCM Console can highlight the client computers that use individual settings by a different icon. To enable this function, set the option Highlight computers with individual settings for BCVE in Computers menu. See also: Deployment of Client Software Remotely BestCrypt Volume Encryption on client computers Rescue procedures on client computers Removable Disks Protection 44

45 Rescue Procedures on Client Computers The Jetico Central Manager (JCM ) Database stores information about disk volumes (partitions) encrypted on remote client computers with BestCrypt Volume Encryption (or BCVE) software. In case of emergency recovery decryption of disk volume may be required (for example, the user has forgotten password or disk on the computer appears as damaged). In this case Jetico Central Manager (JCM) Administrator can create rescue file and decrypt the volume. There are several options for creating the rescue file depending on the case: The user remembers password and encrypted volume is not system or boot. If so, administrator should do the following: 1. In the JCM Console create rescue file for the computer. 2. Run BCVE program on the computer with encrypted disk volume. 3. Run command Decrypt Volume with Rescue File from Rescue menu and browse for the rescue file. The user remembers password and encrypted volume is system or boot (computer won't boot). If so, administrator should create rescue bootable disk. With Jetico Central Manager the Administrator can create several types of rescue bootable disk: 1. CD/DVD. The program creates ISO image file of the CD/DVD disk, then Administrator can use any CD burning software to write the file to CD. 2. USB removable disk. After creating rescue bootable removable disk the administrator boots the computer from the disk. Recovery decryption program from the disk will start and ask to confirm the operation. After confirmation recovery decryption process will run. The user has forgotten password for encrypted volume. Two ways of recovering is possible: 1. The JCM Administrator selects option Generate password to access the computer in the Rescue File dialog window. As a result, JCM will create password the Administrator can use to access the computer. 2. The JCM Administrator creates rescue file or rescue bootable disk and enters temporary password. The password will be required to enter by BCVE program before running the recovery decryption process. The password is necessary to secure information in rescue file so that even if the file is stolen, access to encrypted data would be impossible. To create rescue file or bootable disk, in the left pane of the Jetico Central Manager Console select computer where encrypted disk volume should be recovered. Select BestCrypt Volume Encryption tab and click [Rescue File]. The following dialog window will appear: 45

46 In the dialog window select type of rescue bootable disk or rescue file according to the type of disk volume to be recovered. If the user remembers password for the disk volume, select option Password the user has chosen for disk volumes. Otherwise select option New password set by Supervisor or Administrator. In case of using the second option it will be required to enter the new password. After creating rescue file or rescue bootable disk administrator should use it on the computer where encrypted disk volume has to be recovered. See also: BestCrypt Volume Encryption on client computers Central Management of BestCrypt Volume Encryption Removable Disks Protection 46

47 Removable Disks Protection Jetico Central Manager (JCM) allows Administrator to control and manage encryption policies for removable devices (e.g. USB sticks, USB external drives, SD memory cards) being used on client computers. JCM Encryption Policy for Removable Devices can be set for a group of computers or for individual computer. Once the policy is set, it will be applied for any removable device inserted in the client computer or group of computers. Setting Protection Policy for Removable Disks To set new encryption policy for removable devices or change a previously applied one, the JCM Administrator should click Removable Disks Policy hyperlink in the BestCrypt Volume Encryption tab of JCM Console. The following window will appear: The Encryption policy for removable disks dialog consists of the following controls: Enforce encryption for removable disks check box Check this option if you want to force encreyption of removable devices on client computers. NOTE: the following three controls are only available when the Enforce encryption for removable disks check box is checked: Password Protection radio button If the JCM Administrator selects this option then after the policy is applied, clients are asked to provide a password to encrypt the removable device with. This password is then asked each time the removable device is inserted in client computer. Such devices are accessible both in LAN with JCM Database and outside it (with BestCrypt Volume Encryption personal version, or traveller version). JCM Protection radio button If the Administrator selects this option, after the policy is applied, encryption process starts automatically. The encryption key is then moved to and stored on the JCM Database. No password is requested, the removable device is mounted automatically as it is inserted in the client computer. Such devices are accessible only in the network where JCM Server is active. Allow read-only access to unprotected removable disk check box When Enforce encryption for removable disks option is set, once an unencrypted removable device is inserted in a client computer, the user is notified about the current Policy and asked whether he/she wants to apply it or not. If the user refuses to apply the Policy, the removable device is considered as unprotected, access to it is limited. The 47

48 administrator may choose whether to deny any access (check box is not checked) or to allow read-only access (check box is checked) to unprotected removable devices. Recovering Encrypted Removable Disk In case of damaging encrypted removable disk or if the user has forgotten the password, it is necessary to decrypt the disk. To recover the disk click [Recover Removable Disk] in BestCrypt Volume Encryption tab in the JCM Console. The following dialog window will appear: Choose one of the following options to recover the disk: Generate administrator password for the disk option if the user has forgotten password Rescue file option if filesystem on the disk is corrupted, or error occurs when the client mounts the disk See also: BestCrypt Volume Encryption on client computers Rescue procedures on client computers 48

49 Jetico Central Manager Database Overview of the Jetico Central Manager Database Computers in Jetico Central Manager Database Configuration and Update of Client Software Backup of Jetico Central Manager Database Supervisor and Administrator of JCM Database Jetico Central Manager Reports 49

50 Overview of the Jetico Central Manager Database The Jetico Central Manager Database stores information about computers in a company network. The information allows administrator of the Database to: Deploy Jetico Client Software (BCWipe, BestCrypt Container Encryption, BestCrypt Volume Encryption) on computers in the enterprise network. Manage Jetico Client Software on remote computers. The article Computers in Jetico Central Manager Database explains in detail how information about computers from the company network can be added or removed from the Database, how they can be organized in groups and what operations for them are available in Jetico Central Manager. Jetico Central Manager has a modular architecture and can support any number of client software. Modules for each client software are implemented independently, so Jetico Central Manager can be easily configured to manage only BCWipe on client computers, or any combination of the client software (BCWipe, BestCrypt Container Encryption, BestCrypt Volume Encryption). Read article Configuration and update of client software to get more information about that. Administrator can create backup of Jetico Central Manager Database at any time by running command from menu in the Jetico Central Manager Console. Besides, it is possible to run backup command automatically according to some schedule. Administrator can also restore the Database from backup. With Jetico Central Manager two-level administration of the client software in company network is possible: with Supervisor and Administrator roles. Supervisor can create Administrator account to perform all everyday administrative work. If because of some reason Administrator cannot (or must not) manage the Database anymore, Supervisor can remove Administrator account or change its credentials. Article Supervisor and Administrator of Jetico Central Manager Database describes all the related procedures in more detail. Jetico Central Manager Database Encryption and Initialization. Jetico Central Manager encrypts sensitive information in its database. Encryption key for the database does not appear on disk in a plain form. Instead the key is encrypted by Supervisor and Administrator (if exists) public keys. Hence, Jetico Central Manager Database engine can start to provide client computers with information from the database only when Supervisor or Administrator activates the database by entering password for the public key. So Supervisor (Administrator) must run Jetico Central Manager Console at least once after rebooting computer to unlock the Jetico Central Manager Database. Jetico Central Manager has a residential module that monitors activation of the database. If the computer with the Jetico Central Manager Database is rebooted but the database is not activated (i.e. locked), Jetico Central Manager will show notification message in the system tray icon, like the following picture illustrates. 50

51 As soon as you click the notification icon, Jetico Central Manager will display dialog window for entering password for the database. After entering the password the database will be activated (unlocked) and Jetico Central Manager clients will be able to communicate with the database. See also: Computers in Jetico Central Manager Database Configuration and update of client software Backup of Jetico Central Manager Database Supervisor and Administrator of Jetico Central Manager Database Jetico Central Manager reports 51

52 Computers in Jetico Central Manager Database Adminstrator of Jetico Central Manager handles client software deployed on remote computers in a company network. Before starting to manage the computers the administrator should get them listed in Jetico Central Manager Database. The article explains how to add the computers to the database, remove them from the database and how groups of computers can be created. All the operations with computers can be done via Jetico Central Manager Console. Groups of computers Administrator can group computers in the Jetico Central Manager Database according to any scheme that would be convenient for further management. For example, computers can be grouped by their locations according to room numbers, or according to the departments inside the company. The picture below shows example of computers' groups. To create new empty group of computers, run command New Computer Group from Group menu. Alternatively it may be done from the context menu: right-click with your mouse anywhere on the Computers tab field and run New Computer Group command. New group with default name will be created and name of the group can be changed at that time. It is also possible to edit the name at any time later by running Rename Group command from Group menu, or using right-click menu. 52

53 To move a computer from one group to another, use drag-and-drop, or run Move Computer to Group command from right-click menu of the computer. NOTE: Using special icons JCM Console can highlight computers that use individual settings for BCWipe or BestCrypt Volume Encryption software. In the screenshot above computer with name TPMUEFI has an icon illustrating the use of individual settings for BCWipe and BestCrypt Volume Encryption software. Note that options Highlight computers with Individual Settings... should be set in Computers menu to make JCM showing the special icons. Adding computers to database To add a number of computers to database, run command Add Computers to Selected Group from Computers menu or run the command from the right-click menu of the group. JCM will scan the local network looking for all computers that can be managed by the software. If the option Browse only Windows Domain when look for computers in Computers menu is enabled, the scan process will look for domain computers only. When list of the computers appears, select as many computers as you want to add to the selected computer group and click [Add]. Show only computers not yet added to JCM database - mark the checkbox if you want to see only those computers that have not been added to the Jetico Central Manager (JCM) database earlier. 53

54 To add a single computer to database, run command Add Single Computer to Selected Group from Computers menu or run the command from the right-click menu of the group. The following window will appear: Type the name of the computer and click [OK]. Removing computers from database To remove a computer from the JCM Database select the computer in the left tab of the Jetico Central Manager Console and run Remove Computer command from Computers menu. To remove the whole group select the group and run Delete Group command from Group menu. NOTE: After removing a computer from database and rebooting the computer, client software will be uninstalled. As well, JCM Deployment Agent will be removed. NOTE: the uninstallation process will not run if the computer cannot communicate with the database (for example, if computer has no network connection with computer where service is running). It prevents from the incorrect uninstallation of the client software in case of accidental malfunctioning of the company network. See also: Overview of the Jetico Central Manager Database Configuration and update of client software Deployment Client Software Remotely 54

55 Configuration and Update of Client Software Jetico Central Manager has a modular architecture and can support any number of client software. Modules for each client software are implemented independently, so Jetico Central Manager can be easily configured to manage only BCWipe on client computers, or any combination of the client software (BCWipe, BestCrypt Container Encryption, BestCrypt Volume Encryption). Administrator can choose client software to be managed by Jetico Central Manager. To do that run command Client Software from Software menu in the Jetico Central Manager Console. After running the command the following dialog window appears. In the dialog window set checkboxes for the client software you want to deploy and manage in the company network. Note that the Jetico Central Manager Console will hide tabs in its right pane corresponding to the client software that is not selected for management. For example, if administrator selects only BCWipe for central management, the Jetico Central Manager Console will show only BCWipe tab in its right pane and hide other tabs (BestCrypt Container Encryption and BestCrypt Volume Encryption). After selecting client software for management and clicking [OK] Jetico Central Manager downloads all the necessary modules from Jetico website. If the software is already downloaded, Jetico Central Manager compares versions of downloaded software and software available on the website. If newer version is available, Jetico Central Manager displays status Update Required for the software. It is also possible to update the client software or check the most recent versions manually by running command Update Jetico Central Manager from Software menu. After running the command the following dialog window appears. 55

56 Click [Run update] to download the latest versions of the software. As soon as Jetico Central Manager downloads the software, it will appear as available for update on client computers in the company network. Every client computer where the software is running regularly sends request for possible update to the Jetico Central Manager Database server. So when updated version of client software appears on the server, the software becomes automatically updated on the client computers. Administrator of Jetico Central Manager can automate the process of updating client software by running command Automatic Check for Updates from Software menu. The following dialog window allows the administrator to configure automatic update options. Jetico Central Manager has a special residential module that will check for updates regularly according to the schedule set in the dialog window above. If newer version of client software is detected on Jetico website, the module will show notification message about available update in the system tray: 56

57 Jetico Central Manager uses Internet connection to download client software from Jetico website ( Visit Jetico Download Page to read release notes about enhancements made in the latest versions of the software. See also: Overview of the Jetico Central Manager Database 57

58 Backup of Jetico Central Manager Database Administrator of the Jetico Central Manager Database can create backup copy of the Database manually or automatically. Command Backup Database from Database menu in the Jetico Central Manager Console should be used for that purpose. If an administrator runs the command, the following dialog window appears. To automate the backup process check the Activate Automatic Backup checkbox and choose period (Daily, Weekly, Monthly) and time or day for running the process. Administrator can also use the dialog window to create backup copy of the Database manually by setting checkbox Make backup now and clicking [OK]. To restore contents of the Jetico Central Manager Database from backup run command Restore Database from Database menu. The following window appears after running the command. The dialog window lists all backup copies of the Database and information about the time when the copy was created. Select the copy you want to use to recover the Database, click [OK] and Jetico Central Manager will start using contents of the Database from the backup copy. 58

59 Administrator of a company network may have several Jetico Central Manager Database servers running in the network, for example, to manage different departments of the company with their own Jetico Central Manager Database servers. Administrator also has the option to use the same Jetico Central Manager Console to control all the Database servers. In this case the administrator should be able to choose the Database server he/she wants to manage. To do that the administrator should run command Select Server Computer from Database menu. The following window appears when administrator runs the command. After running the command the program starts searching for all Jetico Central Manager Database servers running in the network. When the search process finishes, the window shows all found servers. The administrator should choose one of the servers and click [OK]. The Jetico Central Manager Console will ask to enter password unique for the Database on the server and will allow the administrator to control the database. See also: Overview of the Jetico Central Manager Database Supervisor and Administrator of Jetico Central Manager Database 59

60 Supervisor and Administrator of JCM Database Jetico Central Manager supports two levels in administration of an enterprise network: Supervisor level Administrator level The Supervisor can run all the commands and manage everything in the Jetico Central Manager software. When you run the software for the first time, the Jetico Central Manager Wizard asks you to choose a password for the Supervisor account. If you are going to run all the management of the software by yourself, you do not need to create additional administrative account, just use one-level administrating scheme. But it is also possible that some other person will be responsible of all the regular work on managing the Jetico Central Manager Database. In this case the Supervisor can create additional Administrator account by running command Create/Change Administrative Account from Administrating -> Supervisor menu in the Jetico Central Manager Console. The Supervisor enters a temporary password for the account and tells the password to the person who will manage the Database. Administrator should enter the password when running the Jetico Central Manager Console.The Administrator can change the temporary password chosen by Supervisor to some other password by running command Change Administrator Password from Administrating -> Administrator menu. NOTE: Supervisor cannot get information about password used by Administrator if Administrator changed the temporary password created by Supervisor. Administrator can manage all the data in the Jetico Central Manager Database as well as Supervisor. The difference between Supervisor and Administrator is in the following: Supervisor can change password of Administrator without knowing the password, but Administrator cannot change anything in Supervisor account. So Supervisor can forbid access to the Jetico Central Manager control functions simply by running command Create/Change Administrative Account from Administrating -> Supervisor menu. If Supervisor runs the command, the following dialog window appears. As the window above shows, Supervisor gets the warning that Administrator account already exists. If Supervisor changes password of Administrator, he/she should tell about new password to the Administrator, otherwise the Administrator will not be able to manage the Jetico Central Manager Database. See also: Overview of the Jetico Central Manager Database Jetico Central Manager Wizard 60

61 Jetico Central Manager Reports An Administrator of Jetico Central Manager can create a report about computers and users that are registered in the database of the software. The report may contain the following information: Information about all computers and users in the database. The information contains details about full user name, comments for computers and users, operating systems running on the computers, Jetico client software deployed on the computers. Information about selected group of the computers. Information about selected computer. Information specific for each Jetico client software running on the computer. For example, information about BCWipe tasksets or encryption status of disk volumes provided by BestCrypt Volume Encryption. Information specific not for all client software, but for selected one (for example, for BCWipe activity on client computers only). List of computers where problems are detected. All the problems are sorted by type (Deployment problems, or problems specific for each client software). To create a Jetico Central Manager report, run command Create Report from Reports and Logs menu in the Jetico Central Manager Console. The following window will appear. Select set of computers and users you want to be in the report (all computers and users or computers from selected group only, or selected computer only). If you check Report only problem computers, then Jetico Central Manager will only add a computer to the report if some problem is detected on the computer. You can select all Jetico client software for the report or only few of them. For example, if you are interested to know what disk volumes are encrypted on client computers, you may select only BestCrypt Volume Encryption for the report. Enter name of file and path where the report should be saved and click [OK]. Jetico Central Manager creates report in HTML format. After creating the report file Jetico Central Manager runs default Internet browser to display contents of the report file. The following picture illustrates how start part of the report may look like. 61

62 See also: Computers in Jetico Central Manager Database 62

Jetico Central Manager Administrator Guide

Jetico Central Manager Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

Introduction Wiping Transparent Wiping Transparent Wiping Reserved Space Enforcer NOTE: BCWipe Enforcer Jetico Central Manager custom wiping schemes

Introduction Wiping Transparent Wiping Transparent Wiping Reserved Space Enforcer NOTE: BCWipe Enforcer Jetico Central Manager custom wiping schemes BCWipe Help File 1 Introduction Wiping is the term used to describe the process of securely erasing data, such as contents of a file or disk space. When files are properly wiped, data is erased beyond

More information

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date: Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................

More information

Sophos Enterprise Console advanced startup guide

Sophos Enterprise Console advanced startup guide Sophos Enterprise Console advanced startup guide For distributed installations Product version: 5.3 Document date: April 2015 Contents 1 About this guide...4 2 Planning installation...5 2.1 Planning the

More information

Acronis Backup & Recovery 11 Beta Advanced Editions

Acronis Backup & Recovery 11 Beta Advanced Editions Acronis Backup & Recovery 11 Beta Advanced Editions Quick Start Guide Table of contents 1 Main components... 3 2 Supported operating systems... 3 3 Where do I install the components?... 3 4 What you need

More information

Quick Start - NetApp File Archiver

Quick Start - NetApp File Archiver Page 1 of 19 Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2: Install

More information

Sophos Enterprise Console

Sophos Enterprise Console advanced startup guide Product Version: 5.5 Contents About this guide... 1 Planning installation... 2 Planning the installation of Enterprise Console... 2 Planning database security... 4 Planning the computer

More information

Quick Start - BlueArc File Archiver

Quick Start - BlueArc File Archiver Page 1 of 20 Quick Start - BlueArc File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2: Install

More information

Administration Guide - NetApp File Archiver

Administration Guide - NetApp File Archiver Page 1 of 100 Administration Guide - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method

More information

Acronis Backup & Recovery 10 Advanced Editions

Acronis Backup & Recovery 10 Advanced Editions Acronis Backup & Recovery 10 Advanced Editions Quick Start Guide This document describes how to install and start using any of the following editions of Acronis Backup & Recovery 10: Acronis Backup & Recovery

More information

8.0 Help for Community Managers Release Notes System Requirements Administering Jive for Office... 6

8.0 Help for Community Managers Release Notes System Requirements Administering Jive for Office... 6 for Office Contents 2 Contents 8.0 Help for Community Managers... 3 Release Notes... 4 System Requirements... 5 Administering Jive for Office... 6 Getting Set Up...6 Installing the Extended API JAR File...6

More information

Installation Manual. Fleet Maintenance Software. Version 6.4

Installation Manual. Fleet Maintenance Software. Version 6.4 Fleet Maintenance Software Installation Manual Version 6.4 6 Terri Lane, Suite 700 Burlington, NJ 08016 (609) 747-8800 Fax (609) 747-8801 Dossier@dossiersystemsinc.com www.dossiersystemsinc.com Copyright

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

Cloud Help for Community Managers...3. Release Notes System Requirements Administering Jive for Office... 6

Cloud Help for Community Managers...3. Release Notes System Requirements Administering Jive for Office... 6 for Office Contents 2 Contents Cloud Help for Community Managers...3 Release Notes... 4 System Requirements... 5 Administering Jive for Office... 6 Getting Set Up...6 Installing the Extended API JAR File...6

More information

Copyright Jetro Platforms, Ltd. All rights reserved.

Copyright Jetro Platforms, Ltd. All rights reserved. Important Notice Copyright 2001 2009 Jetro Platforms, Ltd. All rights reserved. This document is furnished by Jetro Platforms for information purposes only to licensed users of the Jetro COCKPIT product.

More information

Copyright 2017 Softerra, Ltd. All rights reserved

Copyright 2017 Softerra, Ltd. All rights reserved Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service

More information

KYOCERA Net Admin Installation Guide

KYOCERA Net Admin Installation Guide KYOCERA Net Admin Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for

More information

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE

More information

CleanMyPC User Guide

CleanMyPC User Guide CleanMyPC User Guide Copyright 2017 MacPaw Inc. All rights reserved. macpaw.com CONTENTS Overview 3 About CleanMyPC... 3 System requirements... 3 Download and installation 4 Activation and license reset

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Update 2 Advanced Server Server for Windows Virtual Edition Server for Linux Advanced Server SBS Edition Workstation

More information

Symantec Backup Exec Quick Installation Guide

Symantec Backup Exec Quick Installation Guide Symantec Backup Exec 2010 Quick Installation Guide 20047221 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup Exec service account

More information

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft

More information

Administration GUIDE. OnePass Agent for Exchange Mailbox. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177

Administration GUIDE. OnePass Agent for Exchange Mailbox. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177 Administration GUIDE OnePass Agent for Exchange Mailbox Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177 User Guide - One Pass Agent for Exchange Mailbox Table of Contents Overview Introduction

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Quick Start - OnePass Agent for Windows File System

Quick Start - OnePass Agent for Windows File System Page 1 of 23 Quick Start - OnePass Agent for Windows File System TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

ControlPoint. Advanced Installation Guide. September 07,

ControlPoint. Advanced Installation Guide. September 07, ControlPoint Advanced Installation Guide September 07, 2017 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2017 All rights reserved. No part or section of the contents

More information

Server Edition USER MANUAL. For Mac OS X

Server Edition USER MANUAL. For Mac OS X Server Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion are registered

More information

Administration Guide - Celerra File Archiver

Administration Guide - Celerra File Archiver Page 1 of 104 Administration Guide - Celerra File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method

More information

KG-TOWER Software Download and Installation Instructions

KG-TOWER Software Download and Installation Instructions KG-TOWER Software Download and Installation Instructions Procedures are provided for three options to download and install KG-TOWER software version 5.1. Download to a temporary folder and install immediately.

More information

BitDefender Enterprise Manager. Startup guide

BitDefender Enterprise Manager. Startup guide BitDefender Enterprise Manager Startup guide 1 Table of Contents Product installation... 3 Install BitDefender Enterprise Manager... 3 Install BitDefender Server add-on... 4 Protection configuration...

More information

SolidWorks Enterprise PDM Installation Guide

SolidWorks Enterprise PDM Installation Guide SolidWorks Enterprise PDM Installation Guide Contents Legal Notices...vi 1 SolidWorks Enterprise PDM Installation Guide...7 2 Installation Overview...8 Required Installation Components...8 Optional Installation

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Administration Guide - BlueArc File Archiver

Administration Guide - BlueArc File Archiver Page 1 of 103 Administration Guide - BlueArc File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method

More information

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................

More information

QUICK START GUIDE Active Directory idataagent

QUICK START GUIDE Active Directory idataagent QUICK START GUIDE Active Directory idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 39 Quick Start Guide - Active Directory idataagent TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS SUPPORTED

More information

User Manual. Active Directory Change Tracker

User Manual. Active Directory Change Tracker User Manual Active Directory Change Tracker Last Updated: March 2018 Copyright 2018 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software Systems

More information

Setup Guide. Before Setting Up. Installation. Start-up/Shutdown

Setup Guide. Before Setting Up. Installation. Start-up/Shutdown Setup Guide Before Setting Up Installation Start-up/Shutdown For information not in this manual, refer to the HTML/PDF files on the supplied CD-ROM. Read this manual carefully before you use this product

More information

VMware vrealize Operations for Horizon Installation. VMware vrealize Operations for Horizon 6.5

VMware vrealize Operations for Horizon Installation. VMware vrealize Operations for Horizon 6.5 VMware vrealize Operations for Horizon Installation VMware vrealize Operations for Horizon 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

2016. All rights reserved. ecconnect V.11 User Guide

2016. All rights reserved. ecconnect V.11 User Guide 2016. All rights reserved. ecconnect V.11 User Guide Copyright and trademarks ecconnect User Guide Copyright and trademarks The information in this document is subject to change without notice. This document

More information

This document details the procedure for installing Layer8 software agents and reporting dashboards.

This document details the procedure for installing Layer8 software agents and reporting dashboards. Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via

More information

BestCrypt Base User Manual

BestCrypt Base User Manual BestCrypt Base User Manual Introduction Introduction BestCrypt Base Overview HIPAA Compliance Main Features 2 Introduction BestCrypt Base is an encryption software developed for small offices with local

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

Comodo Network Center Software Version 1.1

Comodo Network Center Software Version 1.1 Comodo Network Center Software Version 1.1 User Guide Guide Version 2.3.112311 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents Comodo Network Center - Introduction...

More information

Network Management Utility

Network Management Utility 4343-7705-02 Network Management Utility Foreword Welcome Network Management Utility is utility software that provides central control over printers, copiers, and other devices on a network. With Network

More information

Server Edition USER MANUAL. For Microsoft Windows

Server Edition USER MANUAL. For Microsoft Windows Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows

More information

Virtual CD TS 1 Introduction... 3

Virtual CD TS 1 Introduction... 3 Table of Contents Table of Contents Virtual CD TS 1 Introduction... 3 Document Conventions...... 4 What Virtual CD TS Can Do for You...... 5 New Features in Version 10...... 6 Virtual CD TS Licensing......

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Exchange Protection Whitepaper

Exchange Protection Whitepaper Whitepaper Contents 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Introduction... 2 Documentation... 2 Licensing... 2 Exchange Server Protection overview... 3 Supported platforms... 3 Requirements by platform... 3 Remote

More information

Workstation Configuration Guide

Workstation Configuration Guide Workstation Configuration Guide August 13, 2018 Version 9.6.134.78 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 4 1.1 Considerations

More information

Parallels Virtuozzo Containers 4.6 for Windows

Parallels Virtuozzo Containers 4.6 for Windows Parallels Parallels Virtuozzo Containers 4.6 for Windows Deploying Microsoft Clusters Copyright 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. Parallels Holdings, Ltd. c/o

More information

Server Edition. V8 Peregrine User Manual. for Microsoft Windows

Server Edition. V8 Peregrine User Manual. for Microsoft Windows Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft

More information

Sophos Enterprise Console

Sophos Enterprise Console secure network quick startup guide Product Version: 5.5 Contents About this guide... 1 Limitations on the secure network...2 What do I install?...3 What are the key steps?... 4 Download the installers...5

More information

VMware vrealize Operations for Horizon Installation

VMware vrealize Operations for Horizon Installation VMware vrealize Operations for Horizon Installation vrealize Operations for Horizon 6.4 Installation vrealize Operations for Horizon 6.4 This document supports the version of each product listed and supports

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 15, 2017 - Version 9.3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Real-Time Monitoring Configuration

Real-Time Monitoring Configuration CHAPTER 7 This chapter contains the following information for configuring the Cisco Unified Presence Server Real-Time Monitoring Tool (RTMT). Some options that are available in the current version of the

More information

Jonas Activity Management Technical Deployment Guide

Jonas Activity Management Technical Deployment Guide Jonas Activity Management Technical Deployment Guide [] Software for Life Jonas Activity Management Technical Deployment Guide, Jonas, Jonas Software, Software for Life, and Gary Jonas Computing are registered

More information

Installation on Windows Server 2008

Installation on Windows Server 2008 USER GUIDE MADCAP PULSE 4 Installation on Windows Server 2008 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7 Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 5 Overview... 7 About SonicWALL Single Sign-On

More information

Kaseya 2. User Guide. Version 6.0

Kaseya 2. User Guide. Version 6.0 Kaseya 2 Kaseya Server Installation User Guide Version 6.0 June 21, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

VMware vrealize Operations for Horizon Installation. VMware vrealize Operations for Horizon 6.3

VMware vrealize Operations for Horizon Installation. VMware vrealize Operations for Horizon 6.3 VMware vrealize Operations for Horizon Installation VMware vrealize Operations for Horizon 6.3 VMware vrealize Operations for Horizon Installation You can find the most up-to-date technical documentation

More information

SUREedge DR Installation Guide for Windows Hyper-V

SUREedge DR Installation Guide for Windows Hyper-V SUREedge DR Installation Guide for Windows Hyper-V Contents 1. Introduction... 2 1.1 SUREedge DR Deployment Scenarios... 2 1.2 Installation Overview... 3 2. Obtaining SUREedge Software and Documentation...

More information

Workstation Configuration

Workstation Configuration Workstation Configuration September 22, 2015 - Version 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Traverse Intelligent Tracking by PCS. Installation Guide for Traverse.

Traverse Intelligent Tracking by PCS. Installation Guide for Traverse. Traverse Intelligent Tracking by PCS Installation Guide for Traverse. Tom Romeo 6/10/2011 The information in this documentation is not contractual in nature. It is subject to modification without notice.

More information

ZENworks 2017 Audit Management Reference. December 2016

ZENworks 2017 Audit Management Reference. December 2016 ZENworks 2017 Audit Management Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

Zend Core TM. Installation and Maintenance Guide. Zend Core for Oracle. By Zend Technologies, Inc. w w w. z e n d. c o m

Zend Core TM. Installation and Maintenance Guide. Zend Core for Oracle. By Zend Technologies, Inc. w w w. z e n d. c o m Zend Core TM Installation and Maintenance Guide Zend Core for Oracle By Zend Technologies, Inc. w w w. z e n d. c o m Disclaimer The information in this document is subject to change without notice and

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012 SafeGuard Easy Demo guide Product version: 6 Document date: February 2012 Contents 1 Introduction...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What to expect

More information

LiveVault. Agent Guide

LiveVault. Agent Guide LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about

More information

File Protection Whitepaper

File Protection Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of over traditional file copy methods... 3 2. Backup considerations...

More information

Comodo One Software Version 3.3

Comodo One Software Version 3.3 rat Comodo One Software Version 3.3 Remote Monitoring and Management Administrator Guide Guide Version 6.1.032817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction

More information

FinalCode Viewer User Manual

FinalCode Viewer User Manual FinalCode Viewer User Manual Edition 2.3 Target: FinalCode Viewer Ver.4.30 January 7th, 2015 1 Introduction Thank you for choosing FinalCode. This manual describes how to install, and operate FinalCode

More information

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0 NetIQ Advanced Authentication Framework Deployment Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication Framework Deployment 4

More information

Applied ICT Skills MS Windows

Applied ICT Skills MS Windows Applied ICT Skills MS Windows Lesson 1 - How to install an operating system into computer? Windows 7 is perhaps the best Microsoft operating system and is very easy to install compared to other windows.

More information

3.1. Administrator s Guide TNT SOFTWARE. ELM Log Manager. Version

3.1. Administrator s Guide TNT SOFTWARE. ELM Log Manager. Version Version 3.1 TNT SOFTWARE ELM Log Manager Administrator s Guide TNT SOFTWARE ELM Log Manager 3.1 Administrator s Guide Copyright 1997-2003 TNT Software All Rights Reserved 2001 Main Street Vancouver, WA

More information

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Getting Started Guide This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Contents 2 Contents Introduction... 3 System Requirements... 4

More information

Enterprise Server Edition

Enterprise Server Edition Enterprise Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows,

More information

Storage Manager 2018 R1. Installation Guide

Storage Manager 2018 R1. Installation Guide Storage Manager 2018 R1 Installation Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 USER GUIDE MADCAP PULSE 4 Installation Guide for Pulse on Windows Server 2012 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Kaseya 2. Installation guide. Version R8. English

Kaseya 2. Installation guide. Version R8. English Kaseya 2 Kaseya Server Setup Installation guide Version R8 English October 24, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Administration GUIDE. Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225

Administration GUIDE. Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225 Administration GUIDE Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225 User Guide - Virtual Server idataagent (VMware) Table of Contents System Requirements

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

SafeConsole On-Prem Install Guide

SafeConsole On-Prem Install Guide SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,

More information

MSX-Agent Installation Guide. Version

MSX-Agent Installation Guide. Version MSX-Agent Installation Guide Version 1026 Table of Content 1 INTRODUCTION...4 2 CONFIGURING MS EXCHANGE SERVER...4 3 REDDOXX MSX AGENT...20 4 CONFIGURATION OF THE REDDOXX APPLIANCE...25 2 Copyright 2009

More information

User Guide - Exchange Database idataagent

User Guide - Exchange Database idataagent Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS

More information

Joining a workstation to the agnet.tamu.edu Domain and Profile Migration

Joining a workstation to the agnet.tamu.edu Domain and Profile Migration Joining a workstation to the agnet.tamu.edu Domain and Profile Migration Contents Migration Prerequisites... 1 Firewalls... 1 Run As and Other Alternate Credentialing Methods... 1 File and Print Sharing

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 12, 2017 - Version 9.4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7 Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 5 Overview... 7 About SonicWALL Single Sign-On

More information

How to install the software of ZNS8022

How to install the software of ZNS8022 How to install the software of ZNS8022 1. Please connect ZNS8022 to your PC after finished assembly. 2. Insert Installation CD to your CD-ROM drive and initiate the auto-run program. The wizard will run

More information

File Protection Whitepaper

File Protection Whitepaper File Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of File Protection over traditional file copy methods... 3

More information

DOVICO Timesheet v10 UPGRADE GUIDE

DOVICO Timesheet v10 UPGRADE GUIDE TABLE OF CONTENTS Important Notes... 1 System Requirements... 1 Upgrading from DOVICO Timesheet 8.x or 9.x... 3 Upgrading from Track-IT Suite version 12.x... 5 Performing a clean un-install of DOVICO Timesheet...

More information

Features - SRM Windows File System Agent

Features - SRM Windows File System Agent Page 1 of 53 Features - SRM Windows File System Agent Table of Contents Overview System Requirements - SRM Windows File System Agent Installation Install the SRM Windows File System Agent Install the SRM

More information

Install and Upgrade Guide. Front Office v7.2

Install and Upgrade Guide. Front Office v7.2 c Install and Upgrade Guide Front Office v7.2 Contents 1.0 Introduction... 3 2.0 Prerequisites... 3 3.0 New Install... 4 4.0 Upgrade... 6 5.0 Post Install/Upgrade Validation... 8 6.0 Applying a Service

More information